Illegally. Cybersecurity is obvious. And protecting the infrastructure from cyber and terrorist attacks. And the fourth priority was i want to do everything i can to make sure secretary jay johnson, who is an honorable man, i want to make sure he succeeds in the mission of keeping the country safe. Lets go to cybersecurity. We have had a number of hearings on this. I ask witnesses what are the top proorities and thinks we have to get done. The top priority is facilitate the sharing of information. And i am talking about threat signatures, vulnerabilities. We are not talking about the meta data. It is just impossible for businesses to have to really try to comply with a multitude of different jurisdicational requirements for data breaches. It is cruci w it is crucial we set of federal standard. Those are the those are the top two priorities. Those should be Pretty Simple to accomplish but it has not been simple because you have a legitimate interests. People concerned about american pri
The following move to the regulatory piece, i want to make one other comments. One thing i dont want to be losses why Companies Like ours and others support the information sharing legislation. Partly because to date when we try to stop the cyberthreat it requires lawyers to analyze a variety of statutes weather is electronic communications, determining what we can do so a big aspect of the information sharing that is not talked about as much is the actual authorization component of the legislation so specifically authorization for companies to do things like monitor their networks or take action to stop the attacks or in the last panel ryan asked a question about Liability Protection if you dont act on the threat. Those are critical aspect because that would provide clear Legal Framework notwithstanding information sharing its all the more Legal Framework under which we can apply and that an cybersecurity. A lot of the reasons we support this legislation is it clears up the legal over
Private officials. This runs about two hours. Good morning. Welcome to the fifth National Security cyber forum. If anybody is trying to access the wifi network the password is npc3 c 3nt 5. That is just Like National press club npc3d. And if you didnt get that mary outside can give you the password. Today we are here to listen to industry and government leaders discuss issues that are defining our understanding of the risks that Cyber Attacks pose to our National Security our Economic Security Public Health and safety and the very social and political fabric that governs our lives. As noted in a World Economic forum report many realize that the for the worlds economy to fully derive the value inherent in technology a robust group of Cyber Resilience is essential to litigate the risks of Cyber Attacks. Senior leaders in the public and private sectors across the Different Industries are aware of the need of Cyber Resilience and urging collaboration toward a broad system that spans techno
At their regular meeting on Monday, May 6, the South Tama County Board of Education approved a new 28E agreement relating to their natural gas utility with the
Operator: Good day, ladies and gentlemen, and welcome to the Intellinetics Third Quarter 2023 Earnings Call. Our host for today s call is Tom Baumann with FNK IR.